Trusted execution environment-based key burning system and method

An execution environment and programming system technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as leaked keys, data security threats, and key cracking leaks, to prevent accidental damage and ensure integrity. Effect

Inactive Publication Date: 2018-06-12
AMOLOGIC (SHANGHAI) CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing programming methods have many deficiencies, mainly reflected in the fact that the factory programming method provided by terminal manufacturers can easily lead to artificial leakage of keys, and the keys programmed by terminal manufacturers and application manufacturers in REE (Rich Execution Environment) are easily compromised. crack leak
Once the key is leaked, the data security in the application is seriously threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted execution environment-based key burning system and method
  • Trusted execution environment-based key burning system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the following technical solutions and technical features can be combined with each other.

[0035] The specific embodiments of the present invention will be further described below in conjunction with the drawings:

[0036] Such as figure 1 As shown, a key burning system based on a trusted execution environment includes a back-end device 1 and a terminal device 2. The back-end device 1 is used to encrypt original key data to obtain and output the key data to be burned. The above-mentioned terminal device 2 has a microprocessor based on TrustZone technology. The physical core of the above-mentioned microprocessor is divided into a virtual security core and an ordinary core. The above-mentioned microprocessor provides a trusted execution environment and a rich execution environment. The above-mentioned trusted execution environment provides A secure operating system based on the aforementioned secure core, the aforementioned...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted execution environment-based key burning system, belonging to the field of data security. After a terminal device is enabled, a common operation system is started, thecommon operation system acquires to-be-burned key data and outputs a switch signal and the to-be-burned key data, a microprocessor receives the switch signal in a monitor mode, the processor is switched to a safe operation system from the common operation system, the safe operation system receives the to-be-burned key data and decrypts the to-be-burned key data according to preset key data, acquires corresponding original key data after success decryption and writes the original key data into a safe storage area of the safe operation system. The trusted execution environment-based key burningsystem has the beneficial effects that due to use of trusted execution environment-based key burning, the key is burned, stored and used safely, in addition, the cryptography protects the key from unexpected damage in transmission and keeps the key integral.

Description

Technical field [0001] The invention relates to the technical field of data security, in particular to a key burning system and method based on a trusted execution environment. Background technique [0002] With the popularization of smart devices such as set-top boxes and mobile phones, applications such as online payment and digital rights management (Digital rights management, DRM) have become more and more widespread. Following this, the terminal needs to preset a large number of keys to ensure the data in the application. Security. The terminal manufacturer provides the burning program and the key through the factory burning method, and the key is preset in the terminal. The application manufacturer obtains the key online and burns it into the terminal. [0003] The existing burning methods have many shortcomings, which are mainly reflected in the fact that the factory burning methods provided by terminal manufacturers can easily lead to artificial key leakage, and the keys ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/57
CPCH04L9/083H04L9/0877G06F21/57H04L9/0897H04L9/0822G06F21/602G06F21/74
Inventor 朱朋光蒋培福
Owner AMOLOGIC (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products